Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

3,949 Full-Text Articles 5,386 Authors 1,475,542 Downloads 171 Institutions

All Articles in Software Engineering

Faceted Search

3,949 full-text articles. Page 6 of 156.

Experimental Comparison Of Features, Analyses, And Classifiers For Android Malware Detection, Lwin Khin SHAR, Biniam Fisseha DEMISSIE, Mariano CECCATO, Naing Tun YAN, David LO, Lingxiao JIANG, Christoph BIENERT 2023 Singapore Management University

Experimental Comparison Of Features, Analyses, And Classifiers For Android Malware Detection, Lwin Khin Shar, Biniam Fisseha Demissie, Mariano Ceccato, Naing Tun Yan, David Lo, Lingxiao Jiang, Christoph Bienert

Research Collection School Of Computing and Information Systems

Android malware detection has been an active area of research. In the past decade, several machine learning-based approaches based on different types of features that may characterize Android malware behaviors have been proposed. The usually-analyzed features include API usages and sequences at various abstraction levels (e.g., class and package), extracted using static or dynamic analysis. Additionally, features that characterize permission uses, native API calls and reflection have also been analyzed. Initial works used conventional classifiers such as Random Forest to learn on those features. In recent years, deep learning-based classifiers such as Recurrent Neural Network have been explored. Considering various …


Automated Question Title Reformulation By Mining Modifcation Logs From Stack Overflow, Ke LIU, Xiang CHEN, Chunyang CHEN, Xiaofei XIE, Zhanqi CUI 2023 Nantong University

Automated Question Title Reformulation By Mining Modifcation Logs From Stack Overflow, Ke Liu, Xiang Chen, Chunyang Chen, Xiaofei Xie, Zhanqi Cui

Research Collection School Of Computing and Information Systems

In Stack Overflow, developers may not clarify and summarize the critical problems in the question titles due to a lack of domain knowledge or poor writing skills. Previous studies mainly focused on automatically generating the question titles by analyzing the posts’ problem descriptions and code snippets. In this study, we aim to improve title quality from the perspective of question title reformulation and propose a novel approach QETRA motivated by the findings of our formative study. Specifically, by mining modification logs from Stack Overflow, we first extract title reformulation pairs containing the original title and the reformulated title. Then we …


Generative Model-Based Testing On Decision-Making Policies, Zhuo LI, Xiongfei WU, Derui ZHU, Mingfei CHENG, Siyuan CHEN, Fuyuan ZHANG, Xiaofei XIE, Lei MA, Jianjun ZHAO 2023 Kyushu University

Generative Model-Based Testing On Decision-Making Policies, Zhuo Li, Xiongfei Wu, Derui Zhu, Mingfei Cheng, Siyuan Chen, Fuyuan Zhang, Xiaofei Xie, Lei Ma, Jianjun Zhao

Research Collection School Of Computing and Information Systems

The reliability of decision-making policies is urgently important today as they have established the fundamentals of many critical applications, such as autonomous driving and robotics. To ensure reliability, there have been a number of research efforts on testing decision-making policies that solve Markov decision processes (MDPs). However, due to the deep neural network (DNN)-based inherit and infinite state space, developing scalable and effective testing frameworks for decision-making policies still remains open and challenging.In this paper, we present an effective testing framework for decision-making policies. The framework adopts a generative diffusion model-based test case generator that can easily adapt to different …


The Devil Is In The Tails: How Long-Tailed Code Distributions Impact Large Language Models, Xin ZHOU, Kisub KIM, Bowen XU, Jiakun LIU, DongGyun HAN, David LO 2023 Singapore Management University

The Devil Is In The Tails: How Long-Tailed Code Distributions Impact Large Language Models, Xin Zhou, Kisub Kim, Bowen Xu, Jiakun Liu, Donggyun Han, David Lo

Research Collection School Of Computing and Information Systems

Learning-based techniques, especially advanced Large Language Models (LLMs) for code, have gained considerable popularity in various software engineering (SE) tasks. However, most existing works focus on designing better learning-based models and pay less attention to the properties of datasets. Learning-based models, including popular LLMs for code, heavily rely on data, and the data's properties (e.g., data distribution) could significantly affect their behavior. We conducted an exploratory study on the distribution of SE data and found that such data usually follows a skewed distribution (i.e., long-tailed distribution) where a small number of classes have an extensive collection of samples, while a …


Are We Ready To Embrace Generative Ai For Software Q&A?, Bowen XU, Thanh-Dat NGUYEN, Thanh Le CONG, Thong HOANG, Jiakun LIU, Kisub KIM, Chen GONG, Changan NIU, Chenyu WANG, Xuan-Bach Dinh LE, David LO 2023 Singapore Management University

Are We Ready To Embrace Generative Ai For Software Q&A?, Bowen Xu, Thanh-Dat Nguyen, Thanh Le Cong, Thong Hoang, Jiakun Liu, Kisub Kim, Chen Gong, Changan Niu, Chenyu Wang, Xuan-Bach Dinh Le, David Lo

Research Collection School Of Computing and Information Systems

Stack Overflow, the world's largest software Q&A (SQA) website, is facing a significant traffic drop due to the emergence of generative AI techniques. ChatGPT is banned by Stack Overflow after only 6 days from its release. The main reason provided by the official Stack Overflow is that the answers generated by ChatGPT are of low quality. To verify this, we conduct a comparative evaluation of human-written and ChatGPT-generated answers. Our methodology employs both automatic comparison and a manual study. Our results suggest that human-written and ChatGPT-generated answers are semantically similar, however, human-written answers outperform ChatGPT-generated ones consistently across multiple aspects, …


K-St: A Formal Executable Semantics Of The Structured Text Language For Plcs, Kun WANG, Jingyi WANG, Christopher M. POSKITT, Xiangxiang CHEN, Jun SUN, Peng CHENG 2023 Singapore Management University

K-St: A Formal Executable Semantics Of The Structured Text Language For Plcs, Kun Wang, Jingyi Wang, Christopher M. Poskitt, Xiangxiang Chen, Jun Sun, Peng Cheng

Research Collection School Of Computing and Information Systems

Programmable Logic Controllers (PLCs) are responsible for automating process control in many industrial systems (e.g. in manufacturing and public infrastructure), and thus it is critical to ensure that they operate correctly and safely. The majority of PLCs are programmed in languages such as Structured Text (ST). However, a lack of formal semantics makes it difficult to ascertain the correctness of their translators and compilers, which vary from vendor-to-vendor. In this work, we develop K-ST, a formal executable semantics for ST in the K framework. Defined with respect to the IEC 61131-3 standard and PLC vendor manuals, K-ST is a high-level …


Edge Distraction-Aware Salient Object Detection, Sucheng REN, Wenxi LIU, Jianbo JIAO, Guoqiang HAN, Shengfeng HE 2023 Singapore Management University

Edge Distraction-Aware Salient Object Detection, Sucheng Ren, Wenxi Liu, Jianbo Jiao, Guoqiang Han, Shengfeng He

Research Collection School Of Computing and Information Systems

Integrating low-level edge features has been proven to be effective in preserving clear boundaries of salient objects. However, the locality of edge features makes it difficult to capture globally salient edges, leading to distraction in the final predictions. To address this problem, we propose to produce distraction-free edge features by incorporating cross-scale holistic interdependencies between high-level features. In particular, we first formulate our edge features extraction process as a boundary-filling problem. In this way, we enforce edge features to focus on closed boundaries instead of those disconnected background edges. Second, we propose to explore cross-scale holistic contextual connections between every …


Arduinoprog: Towards Automating Arduino Programming, IMAM NUR BANI YUSUF, DIYANAH BINTE ABDUL JAMAL, Lingxiao JIANG 2023 Singapore Management University

Arduinoprog: Towards Automating Arduino Programming, Imam Nur Bani Yusuf, Diyanah Binte Abdul Jamal, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

Writing code for Arduino poses unique challenges. A developer 1) needs hardware-specific knowledge about the interface configuration between the Arduino controller and the I/Ohardware, 2) identifies a suitable driver library for the I/O hardware, and 3) follows certain usage patterns of the driver library in order to use them properly. In this work, based on a study of real-world user queries posted in the Arduino forum, we propose ArduinoProg to address such challenges. ArduinoProg consists of three components, i.e., Library Retriever, Configuration Classifier, and Pattern Generator. Given a query, Library Retriever retrieves library names relevant to the I/O hardware identified …


Autoconf: Automated Configuration Of Unsupervised Learning Systems Using Metamorphic Testing And Bayesian Optimization, Lwin Khin SHAR, GOKNIL Arda, Erik Johannes HUSOM, Sagar Sen SEN, Naing Tun YAN, Kisub KIM 2023 Singapore Management University

Autoconf: Automated Configuration Of Unsupervised Learning Systems Using Metamorphic Testing And Bayesian Optimization, Lwin Khin Shar, Goknil Arda, Erik Johannes Husom, Sagar Sen Sen, Naing Tun Yan, Kisub Kim

Research Collection School Of Computing and Information Systems

Unsupervised learning systems using clustering have gained significant attention for numerous applications due to their unique ability to discover patterns and structures in large unlabeled datasets. However, their effectiveness highly depends on their configuration, which requires domain-specific expertise and often involves numerous manual trials. Specifically, selecting appropriate algorithms and hyperparameters adds to the com- plexity of the configuration process. In this paper, we propose, apply, and assess an automated approach (AutoConf) for config- uring unsupervised learning systems using clustering, leveraging metamorphic testing and Bayesian optimization. Metamorphic testing is utilized to verify the configurations of unsupervised learning systems by applying a …


Endwatch: A Practical Method For Detecting Non-Termination In Real-World Software, Yao ZHANG, Xiaofei XIE, Yi LI, Sen CHEN, Cen ZHANG, Xiaohong LI 2023 Tianjin University

Endwatch: A Practical Method For Detecting Non-Termination In Real-World Software, Yao Zhang, Xiaofei Xie, Yi Li, Sen Chen, Cen Zhang, Xiaohong Li

Research Collection School Of Computing and Information Systems

Detecting non-termination is crucial for ensuring program correctness and security, such as preventing denial-of-service attacks. While termination analysis has been studied for many years, existing methods have limited scalability and are only effective on small programs. To address this issue, we propose a practical termination checking technique, called EndWatch, for detecting non-termination through testing. Specifically, we introduce two methods to generate non-termination oracles based on checking state revisits, i.e., if the program returns to a previously visited state at the same program location, it does not terminate. The non-termination oracles can be incorporated into testing tools (e.g., AFL used in …


Are We Ready To Embrace Generative Ai For Software Q&A?, Bowen XU, Thanh-Dat NGUYEN, Thanh LE-CONG, Thong HOANG, Jiakun LIU, Kisub KIM, Chen GONG, Changan NIU, Chenyu WANG, David LO, David LO 2023 Singapore Management University

Are We Ready To Embrace Generative Ai For Software Q&A?, Bowen Xu, Thanh-Dat Nguyen, Thanh Le-Cong, Thong Hoang, Jiakun Liu, Kisub Kim, Chen Gong, Changan Niu, Chenyu Wang, David Lo, David Lo

Research Collection School Of Computing and Information Systems

Stack Overflow, the world's largest software Q&A (SQA) website, is facing a significant traffic drop due to the emergence of generative AI techniques. ChatGPT is banned by Stack Overflow after only 6 days from its release. The main reason provided by the official Stack Overflow is that the answers generated by ChatGPT are of low quality. To verify this, we conduct a comparative evaluation of human-written and ChatGPT-generated answers. Our methodology employs both automatic comparison and a manual study. Our results suggest that human-written and ChatGPT-generated answers are semantically similar, however, human-written answers outperform ChatGPT-generated ones consistently across multiple aspects, …


Learning Representations For Effective And Explainable Software Bug Detection And Fixing, Yi Li 2023 New Jersey Institute of Technology

Learning Representations For Effective And Explainable Software Bug Detection And Fixing, Yi Li

Dissertations

Software has an integral role in modern life; hence software bugs, which undermine software quality and reliability, have substantial societal and economic implications. The advent of machine learning and deep learning in software engineering has led to major advances in bug detection and fixing approaches, yet they fall short of desired precision and recall. This shortfall arises from the absence of a 'bridge,' known as learning code representations, that can transform information from source code into a suitable representation for effective processing via machine and deep learning.

This dissertation builds such a bridge. Specifically, it presents solutions for effectively learning …


Program Analysis For Android Security And Reliability, Sydur Rahaman 2023 New Jersey Institute of Technology

Program Analysis For Android Security And Reliability, Sydur Rahaman

Dissertations

The recent, widespread growth and adoption of mobile devices have revolutionized the way users interact with technology. As mobile apps have become increasingly prevalent, concerns regarding their security and reliability have gained significant attention. The ever-expanding mobile app ecosystem presents unique challenges in ensuring the protection of user data and maintaining app robustness. This dissertation expands the field of program analysis with techniques and abstractions tailored explicitly to enhancing Android security and reliability. This research introduces approaches for addressing critical issues related to sensitive information leakage, device and user fingerprinting, mobile medical score calculators, as well as termination-induced data loss. …


Form Auto Generation: An Analysis Of Gui Generation, Jedadiah McFarland 2023 University of Nebraska at Omaha

Form Auto Generation: An Analysis Of Gui Generation, Jedadiah Mcfarland

Theses/Capstones/Creative Projects

Graphical User Interfaces (GUIs) have transformed how we interact with computers, offering visually appealing and intuitive systems. This paper explores the origins and evolution of GUIs, explicitly focusing on form auto-generation in modern GUI-driven environments. Form auto-generation has emerged as a prominent practice, enabling automatic form creation based on predefined models. To better understand form auto-generation, I investigate SurveyJS, an open-source form auto-generation library known for its active development and support. This investigation aims to understand how SurveyJS recognizes and renders objects from a JSON model. The methodology involves a trial and error examination of the library, exploring its live …


Optimizing Collective Communication For Scalable Scientific Computing And Deep Learning, Jiali Li 2023 University of Tennessee, Knoxville

Optimizing Collective Communication For Scalable Scientific Computing And Deep Learning, Jiali Li

Doctoral Dissertations

In the realm of distributed computing, collective operations involve coordinated communication and synchronization among multiple processing units, enabling efficient data exchange and collaboration. Scientific applications, such as simulations, computational fluid dynamics, and scalable deep learning, require complex computations that can be parallelized across multiple nodes in a distributed system. These applications often involve data-dependent communication patterns, where collective operations are critical for achieving high performance in data exchange. Optimizing collective operations for scientific applications and deep learning involves improving the algorithms, communication patterns, and data distribution strategies to minimize communication overhead and maximize computational efficiency.

Within the context of this …


Visualizing Transaction-Level Modeling Simulations Of Deep Neural Networks, Nataniel Farzan, Emad Arasteh 2023 Chapman University

Visualizing Transaction-Level Modeling Simulations Of Deep Neural Networks, Nataniel Farzan, Emad Arasteh

Engineering Technical Reports

The growing complexity of data-intensive software demands constant innovation in computer hardware design. Performance is a critical factor in rapidly evolving applications such as artificial intelligence (AI). Transaction-level modeling (TLM) is a valuable technique used to represent hardware and software behavior in a simulated environment. However, extracting actionable insights from TLM simulations is not a trivial task. We present Netmemvisual, an interactive, cross-platform visualization tool for exposing memory bottlenecks in TLM simulations. We demonstrate how Netmemvisual helps system designers rapidly analyze complex TLM simulations to find memory contention. We describe the project’s current features, experimental results with two state-of-the-art deep …


Sparsity Brings Vulnerabilities: Exploring New Metrics In Backdoor Attacks, Jianwen TIAN, Kefan QIU, Debin GAO, Zhi WANG, Xiaohui KUANG, Gang ZHAO 2023 Singapore Management University

Sparsity Brings Vulnerabilities: Exploring New Metrics In Backdoor Attacks, Jianwen Tian, Kefan Qiu, Debin Gao, Zhi Wang, Xiaohui Kuang, Gang Zhao

Research Collection School Of Computing and Information Systems

Nowadays, using AI-based detectors to keep pace with the fast iterating of malware has attracted a great attention. However, most AI-based malware detectors use features with vast sparse subspaces to characterize applications, which brings significant vulnerabilities to the model. To exploit this sparsityrelated vulnerability, we propose a clean-label backdoor attack consisting of a dissimilarity metric-based candidate selection and a variation ratio-based trigger construction. The proposed backdoor is verified on different datasets, including a Windows PE dataset, an Android dataset with numerical and boolean feature values, and a PDF dataset. The experimental results show that the attack can slash the accuracy …


Web Based Management System For Housing Society, Likhitha Reddy Eddala 2023 California State University, San Bernardino

Web Based Management System For Housing Society, Likhitha Reddy Eddala

Electronic Theses, Projects, and Dissertations

Web Based Management System for Housing Society plays a major role in our day-to-day life. We develop a global web dependent application using AngularJS, Node JS and MySQL, with Xampp as the server to make an effective management system. This system is designed to provide a user-friendly and efficient platform for managing all the details of daily notices, monthly meetings, events, payments, maids etc., This system mainly consists of three modules, they are: Admin, User and Security. Each module here serves specific features and functionalities present within society. Admin module provides the features for managing user, houses, security, maids, notices, …


Contactless Food Ordering System, Rishivar Kumar Goli 2023 California State University, San Bernardino

Contactless Food Ordering System, Rishivar Kumar Goli

Electronic Theses, Projects, and Dissertations

Contactless food ordering has revolutionized the way a customer interacts with restaurants by allowing them to place orders and make transactions. Through these web-based platforms, customers can now browse menus, customize orders, and make payments seamlessly. By scanning the restaurant’s QR code, customers can reserve a table. If the table is available, then automatically it will be reserved. However, if the table is occupied the customer will be added to the waiting list. Once the customer selects desired food then they can securely make payments based on ordered food items. The food will be delivered straight to the customer's table. …


The Future Of Cryptocurrency And Blockchain Technology In Finance, Wanyi WONG, Alan @ Ali MADJELISI MEGARGEL 2023 Singapore Management University

The Future Of Cryptocurrency And Blockchain Technology In Finance, Wanyi Wong, Alan @ Ali Madjelisi Megargel

Research Collection School Of Computing and Information Systems

Cryptocurrencies have been all the rage in recent years, with many being drawn to their appeal as speculative investment assets. Its proponents also champion the secure and decentralised nature of the technology it is based on, called the blockchain. Given the secure nature of blockchain technology, the idea of adopting cryptocurrencies as legal tender currency has also been mooted and experimented with – with the most famous example being the Central American nation of El Salvador’s bold move to adopting the cryptocurrency Bitcoin as legal tender in September 2021. In theory, this would provide a solution to the high transaction …


Digital Commons powered by bepress